SlideShare a Scribd company logo
Hacking beyond hacking -
forgotten chapters.




                      Milan Gabor
whoami
Cop or not a cop?
Before we start
Disclaimer
This presentation was created for
educational purposes. I will not take any
responsibility for any action you cause
using the information shown in this
presentation. Please do not contact me
with blackhat type hacking requests.
Thanks!

             Original taken from: http://www.lo0.ro/
Where do I come from
Romania/n
Hackers?
Whois is hacking????
Miracles?
Hacking beyond hacking - Forgotten Chapters - DefCamp 2012
No need to hack!
NDAs
Where is money spent?
Blame who?
Developers ?!?!
> fileproxy.ashx?path=ProfilesDo
  mainUsernamePathpics/pict
  ure.jpg
Environment?
To see and feel invisible!
True vision?
I have been doing same things as other
people.
I just looked them in different way.
                             Albert Einstein
All our life depends
> demo:demo
> test:test
> admin:admin
> no pass
Rookies?
Errors?
SNMP
DOS?
One life (file)?
Is it getting better?
Or do you feel the same?
Will it make it easier on you now?
You got someone to blame
You say
One love
One life
... file                                       U2



                 company-xxx.zip   10.345.441 bytes 0.0.000
Algorithm
> Windows domain internal
  short-company-name.ro
> Outside not registered
> Register with official registrar
> Have fun!!
Puppets?
After that
Encryption?
TWpjME1ETT0=
Mjc0MDM=
27403

> Don
  own!!!
Phones
Almost best hacking tool
When everything else fails!
Hacking beyond hacking - Forgotten Chapters - DefCamp 2012
PASSION
Or perhaps you should! ;)
Hacking beyond hacking - Forgotten Chapters - DefCamp 2012
Thank you all!

       milan@viris.si

        @MilanGabor

Stop me. Talk to me. Bug me.
               I am nice guy. ;)

More Related Content

PPT
First Do No Harm: Ethics and Online Representation
PPT
Internet safety
PPT
Internet safety
PPS
Social Engineering - DefCamp 2012
PPT
Corporate Network Security 101
PPTX
Securitatea in secolul 21
PPTX
Analiza si evolutia vulnerabilitatilor web
PPT
Vulnerabilitati 0-day in software de larg interes
First Do No Harm: Ethics and Online Representation
Internet safety
Internet safety
Social Engineering - DefCamp 2012
Corporate Network Security 101
Securitatea in secolul 21
Analiza si evolutia vulnerabilitatilor web
Vulnerabilitati 0-day in software de larg interes

Similar to Hacking beyond hacking - Forgotten Chapters - DefCamp 2012 (20)

PDF
Strategies for securing your banks & enterprises (from someone who robs bank...
PDF
HACKED PC : -I don't care attitude
PDF
Breaking out of restricted RDP
PDF
The challenges of file formats
PDF
How to protect your privacy online
PDF
How To Protect Your Privacy Online
PDF
Things that go bump on the web - Web Application Security
PDF
Hacking with experts (by anurag dwivedi)
PDF
Plone, battle-scarred community with battle tanks
PPTX
trojan horse- malware(virus)
PDF
Cyber Analysts: who they are, what they do, where they are - Marco Ramilli - ...
KEY
Rise of the Autobots: Into the Underground of Social Network Bots
PDF
Introduction to Audio Podcasting Blogworld 2009
PPT
Thou shalt not
PPT
How you can become a hacker with no security experience
PPTX
Trojan horse
PPTX
Libby naylor tech 2k14
PPTX
BSides Rochester 2018: Michael West: Sentry, Or: How I Learned To Stop Worryi...
PPT
If i wake evil 360
PPTX
Nerino Petro - Protecting your Digital ASSets: What we can learn from recent ...
Strategies for securing your banks & enterprises (from someone who robs bank...
HACKED PC : -I don't care attitude
Breaking out of restricted RDP
The challenges of file formats
How to protect your privacy online
How To Protect Your Privacy Online
Things that go bump on the web - Web Application Security
Hacking with experts (by anurag dwivedi)
Plone, battle-scarred community with battle tanks
trojan horse- malware(virus)
Cyber Analysts: who they are, what they do, where they are - Marco Ramilli - ...
Rise of the Autobots: Into the Underground of Social Network Bots
Introduction to Audio Podcasting Blogworld 2009
Thou shalt not
How you can become a hacker with no security experience
Trojan horse
Libby naylor tech 2k14
BSides Rochester 2018: Michael West: Sentry, Or: How I Learned To Stop Worryi...
If i wake evil 360
Nerino Petro - Protecting your Digital ASSets: What we can learn from recent ...

More from DefCamp (20)

PDF
Remote Yacht Hacking
PDF
Mobile, IoT, Clouds… It’s time to hire your own risk manager!
PPTX
The Charter of Trust
PPTX
Internet Balkanization: Why Are We Raising Borders Online?
PPTX
Bridging the gap between CyberSecurity R&D and UX
PPTX
Secure and privacy-preserving data transmission and processing using homomorp...
PPTX
Drupalgeddon 2 – Yet Another Weapon for the Attacker
PPTX
Economical Denial of Sustainability in the Cloud (EDOS)
PPTX
Trust, but verify – Bypassing MFA
PPTX
Threat Hunting: From Platitudes to Practical Application
PPTX
Building application security with 0 money down
PPTX
Implementation of information security techniques on modern android based Kio...
PPTX
Lattice based Merkle for post-quantum epoch
PPTX
The challenge of building a secure and safe digital environment in healthcare
PPTX
Timing attacks against web applications: Are they still practical?
PPTX
Tor .onions: The Good, The Rotten and The Misconfigured
PPTX
Needles, Haystacks and Algorithms: Using Machine Learning to detect complex t...
PPTX
We will charge you. How to [b]reach vendor’s network using EV charging station.
PPTX
Connect & Inspire Cyber Security
PPTX
The lions and the watering hole
Remote Yacht Hacking
Mobile, IoT, Clouds… It’s time to hire your own risk manager!
The Charter of Trust
Internet Balkanization: Why Are We Raising Borders Online?
Bridging the gap between CyberSecurity R&D and UX
Secure and privacy-preserving data transmission and processing using homomorp...
Drupalgeddon 2 – Yet Another Weapon for the Attacker
Economical Denial of Sustainability in the Cloud (EDOS)
Trust, but verify – Bypassing MFA
Threat Hunting: From Platitudes to Practical Application
Building application security with 0 money down
Implementation of information security techniques on modern android based Kio...
Lattice based Merkle for post-quantum epoch
The challenge of building a secure and safe digital environment in healthcare
Timing attacks against web applications: Are they still practical?
Tor .onions: The Good, The Rotten and The Misconfigured
Needles, Haystacks and Algorithms: Using Machine Learning to detect complex t...
We will charge you. How to [b]reach vendor’s network using EV charging station.
Connect & Inspire Cyber Security
The lions and the watering hole

Hacking beyond hacking - Forgotten Chapters - DefCamp 2012